[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Reflects downloads up to 13 Dec 2024Bibliometrics
Skip Table Of Content Section
research-article
Management of Performance Requirements for Information Systems

Management of performance requirements is a major challenge for information systems as well as other software systems. This is because performance requirements (e.g., a student records system should have good response time for registering students ) can ...

research-article
Experience with Performance Testing of Software Systems: Issues, an Approach, and Case Study

An approach to software performance testing is discussed. A case study describing the experience of using this approach for testing the performance of a system used as a gateway in a large industrial client/server transaction processing application is ...

research-article
Modeling the Effects of Combining Diverse Software Fault Detection Techniques

The software engineering literature contains many studies of the efficacy of fault finding techniques. Few of these, however, consider what happens when several different techniques are used together. We show that the effectiveness of such ...

research-article
Designing Process Replication and Activation: A Quantitative Approach

Distributed application systems are composed of classes of objects with instances that interact to accomplish common goals. Such systems can have many classes of users with many types of requests. Furthermore, the relative load of these classes can ...

research-article
A Learning Agent that Assists the Browsing of Software Libraries

Locating software items is difficult, even for knowledgeable software designers, when searching in large, complex, and continuously growing libraries. This paper describes a technique we term active browsing. An active browser suggests to the designer ...

research-article
Secure Execution of Java Applets Using a Remote Playground

Mobile code presents a number of threats to machines that execute it. We introduce an approach for protecting machines and the resources they hold from mobile code and describe a system based on our approach for protecting host machines from Java 1.1 ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.